Нема описа

Andy Rothfusz 5c190fa926 Fix #1993: add explanation for export restrictions пре 12 година
auth a7db125480 Minor spelling correction of protocoll -> protocol пре 12 година
contrib 10362870db Add a few tweaks and fixes to contrib/mkimage-debian.sh пре 12 година
docker 46a1cd69a9 only os.Exits on error пре 12 година
docs 6097644e4b Fix #1969 formatting, add information about multiline json пре 12 година
hack a4067b1b44 Add @tianon to hack/MAINTAINERS пре 12 година
library 4dc04d7690 Add GitHub usernames to MAINTAINERS пре 12 година
packaging 331f983593 Start docker after lxc-net to prevent ip forwarding race пре 12 година
registry 5867f9e761 Modify repository name regex to match index пре 12 година
term 78d995bbd6 Fix syscall name. пре 12 година
testing 846524115b testing, issue #1620: Add index functional test on docker-ci пре 12 година
utils bd0e4fde9a Merge pull request #1838 from jmcvetta/multiline_dockerfile пре 12 година
vendor cfbe76e559 Update tar dependency to newest version пре 12 година
.gitignore 45cedefadb hack/vendor.sh: overwrite existing dependencies and remove .git so they can be checked in пре 12 година
.mailmap 1408f08c40 Update AUTHORS пре 12 година
AUTHORS b7826f5666 add Brian Olsen to AUTHORS пре 12 година
CHANGELOG.md ca5913ff3e Bump version to 0.6.2 пре 12 година
CONTRIBUTING.md 465d5313c5 Update for new mailing list пре 12 година
Dockerfile e37dcd726f Hack: use vendored dependencies in-place, for less moving parts when developing пре 12 година
FIXME a359e52f29 Added FIXME for iproute → netlink as advised in issue #925. пре 12 година
LICENSE a7e9582a53 Docker is now licensed under the Apache 2.0 license пре 12 година
MAINTAINERS 4dc04d7690 Add GitHub usernames to MAINTAINERS пре 12 година
NOTICE 5c190fa926 Fix #1993: add explanation for export restrictions пре 12 година
README.md eed00a4afd README: remove original shipping containers 'manifesto'. It's a little long to stay here. пре 12 година
VERSION fee61895f2 Update VERSION пре 12 година
Vagrantfile 8878943ac9 deployment, issue #1578: Avoid pinning kernel headers. Add Vagrantfile assumptions пре 12 година
api.go 8d48119340 Merge pull request #1894 from dotcloud/1891-remove_useless_warnings пре 12 година
api_params.go 9ae5054c34 Bumped API version in api.go ; added <1.5 behavior to getContainersJSON пре 12 година
api_test.go bd0e4fde9a Merge pull request #1838 from jmcvetta/multiline_dockerfile пре 12 година
archive.go 9b2a5964fc Fixed typos пре 12 година
archive_test.go 1277dca335 Style fixes for fmt + err usage. пре 12 година
buildfile.go 33972627b7 Merge pull request #1848 from dotcloud/build-clean пре 12 година
buildfile_test.go b7a3fc687e Add rm option to docker build to remove intermediate containers пре 12 година
changes.go 46c9c5c843 Made calling changelog before run return empty. Fixes #1705. пре 12 година
commands.go 2fafe1efce Merge pull request #1948 from dotcloud/fix_attach пре 12 година
commands_test.go e97364ecd7 Improve detach unit tests пре 12 година
container.go 2fafe1efce Merge pull request #1948 from dotcloud/fix_attach пре 12 година
container_test.go 23cf3c7a33 Merge pull request #1934 from dotcloud/host-permissions пре 12 година
graph.go ad152efbed Merge pull request #1759 from bdon/graph-map пре 12 година
graph_test.go 1fca99ad90 Replace Graph.All with Graph.Map пре 12 година
image.go f6fa353dd8 Merge pull request #1267 from sridatta/new-clean-init пре 12 година
lxc_template.go 5a01f7485c Only mount hostname files if config exists пре 12 година
mount.go 2f67a62b5b run auplink before unmounting aufs пре 12 година
mount_darwin.go 8b61af1895 Re-added mount_*.go in docker package to not break tests/build пре 12 година
mount_linux.go aa12da6f50 go fmt пре 12 година
network.go 6756e786ac Just fixing gofmt issues in other people's code. пре 12 година
network_proxy.go c766d064ac Always stop the opposite goroutine in network_proxy.go (closes #1213) пре 12 година
network_proxy_test.go fac0d87d00 Add support for UDP (closes #33) пре 12 година
network_test.go f5a8e90d10 Make sure the routes IP are taken into consideration + add unit test for network overlap detection пре 12 година
runtime.go bd847f66c6 rebase master пре 12 година
runtime_test.go ad152efbed Merge pull request #1759 from bdon/graph-map пре 12 година
server.go c6dc90ccb9 Fixed push bug пре 12 година
server_test.go b44d113120 filter image listing using path.Match пре 12 година
sorter.go e6affb1b1a Sort images by tag name when the creation date is the same. пре 12 година
sorter_test.go e6affb1b1a Sort images by tag name when the creation date is the same. пре 12 година
state.go 91520838fc Make sure container is not marked as ghost when it starts пре 12 година
sysinit.go d80b50d4b4 Improve formatting with 'go fmt' as stated in CONTRIBUTING.md пре 12 година
tags.go 44b3e8d51b Reverse priority of tag lookup in TagStore.GetImage пре 12 година
tags_test.go 6bdb6f226b Simplify unit tests code with mkRuntime() пре 12 година
utils.go 551092f9c0 Add lxc-conf flag to allow custom lxc options пре 12 година
utils_test.go 24e02043a2 Merge builder.go into runtime.go пре 12 година
z_final_test.go fd9ad1a194 Fixes #505 - Make sure all output is send on the network before closing пре 12 година

README.md

Docker: the Linux container engine

Docker is an open source project to pack, ship and run any application as a lightweight container

Docker containers are both hardware-agnostic and platform-agnostic. This means that they can run anywhere, from your laptop to the largest EC2 compute instance and everything in between - and they don't require that you use a particular language, framework or packaging system. That makes them great building blocks for deploying and scaling web apps, databases and backend services without depending on a particular stack or provider.

Docker is an open-source implementation of the deployment engine which powers dotCloud, a popular Platform-as-a-Service. It benefits directly from the experience accumulated over several years of large-scale operation and support of hundreds of thousands of applications and databases.

Docker L

Better than VMs

A common method for distributing applications and sandbox their execution is to use virtual machines, or VMs. Typical VM formats are VMWare's vmdk, Oracle Virtualbox's vdi, and Amazon EC2's ami. In theory these formats should allow every developer to automatically package their application into a "machine" for easy distribution and deployment. In practice, that almost never happens, for a few reasons:

  • Size: VMs are very large which makes them impractical to store and transfer.
  • Performance: running VMs consumes significant CPU and memory, which makes them impractical in many scenarios, for example local development of multi-tier applications, and large-scale deployment of cpu and memory-intensive applications on large numbers of machines.
  • Portability: competing VM environments don't play well with each other. Although conversion tools do exist, they are limited and add even more overhead.
  • Hardware-centric: VMs were designed with machine operators in mind, not software developers. As a result, they offer very limited tooling for what developers need most: building, testing and running their software. For example, VMs offer no facilities for application versioning, monitoring, configuration, logging or service discovery.

By contrast, Docker relies on a different sandboxing method known as containerization. Unlike traditional virtualization, containerization takes place at the kernel level. Most modern operating system kernels now support the primitives necessary for containerization, including Linux with openvz, vserver and more recently lxc, Solaris with zones and FreeBSD with Jails.

Docker builds on top of these low-level primitives to offer developers a portable format and runtime environment that solves all 4 problems. Docker containers are small (and their transfer can be optimized with layers), they have basically zero memory and cpu overhead, they are completely portable and are designed from the ground up with an application-centric design.

The best part: because docker operates at the OS level, it can still be run inside a VM!

Plays well with others

Docker does not require that you buy into a particular programming language, framework, packaging system or configuration language.

Is your application a Unix process? Does it use files, tcp connections, environment variables, standard Unix streams and command-line arguments as inputs and outputs? Then docker can run it.

Can your application's build be expressed as a sequence of such commands? Then docker can build it.

Escape dependency hell

A common problem for developers is the difficulty of managing all their application's dependencies in a simple and automated way.

This is usually difficult for several reasons:

  • Cross-platform dependencies. Modern applications often depend on a combination of system libraries and binaries, language-specific packages, framework-specific modules, internal components developed for another project, etc. These dependencies live in different "worlds" and require different tools - these tools typically don't work well with each other, requiring awkward custom integrations.

  • Conflicting dependencies. Different applications may depend on different versions of the same dependency. Packaging tools handle these situations with various degrees of ease - but they all handle them in different and incompatible ways, which again forces the developer to do extra work.

  • Custom dependencies. A developer may need to prepare a custom version of their application's dependency. Some packaging systems can handle custom versions of a dependency, others can't - and all of them handle it differently.

Docker solves dependency hell by giving the developer a simple way to express all their application's dependencies in one place, and streamline the process of assembling them. If this makes you think of XKCD 927, don't worry. Docker doesn't replace your favorite packaging systems. It simply orchestrates their use in a simple and repeatable way. How does it do that? With layers.

Docker defines a build as running a sequence of Unix commands, one after the other, in the same container. Build commands modify the contents of the container (usually by installing new files on the filesystem), the next command modifies it some more, etc. Since each build command inherits the result of the previous commands, the order in which the commands are executed expresses dependencies.

Here's a typical Docker build process:

from ubuntu:12.10
run apt-get update
run DEBIAN_FRONTEND=noninteractive apt-get install -q -y python
run DEBIAN_FRONTEND=noninteractive apt-get install -q -y python-pip
run pip install django
run DEBIAN_FRONTEND=noninteractive apt-get install -q -y curl
run curl -L https://github.com/shykes/helloflask/archive/master.tar.gz | tar -xzv
run cd helloflask-master && pip install -r requirements.txt

Note that Docker doesn't care how dependencies are built - as long as they can be built by running a Unix command in a container.

Getting started

Docker can be installed on your local machine as well as servers - both bare metal and virtualized. It is available as a binary on most modern Linux systems, or as a VM on Windows, Mac and other systems.

We also offer an interactive tutorial for quickly learning the basics of using Docker.

For up-to-date install instructions and online tutorials, see the Getting Started page.

Usage examples

Docker can be used to run short-lived commands, long-running daemons (app servers, databases etc.), interactive shell sessions, etc.

You can find a list of real-world examples in the documentation.

Under the hood

Under the hood, Docker is built on the following components:

  • The cgroup and namespacing capabilities of the Linux kernel;
  • AUFS, a powerful union filesystem with copy-on-write capabilities;
  • The Go programming language;
  • lxc, a set of convenience scripts to simplify the creation of Linux containers.

Contributing to Docker

Want to hack on Docker? Awesome! There are instructions to get you started here.

They are probably not perfect, please let us know if anything feels wrong or incomplete.

Legal

Transfers of Docker shall be in accordance with applicable export controls of any country and all other applicable legal requirements. Docker shall not be distributed or downloaded to or in Cuba, Iran, North Korea, Sudan or Syria and shall not be distributed or downloaded to any person on the Denied Persons List administered by the U.S. Department of Commerce.